咨询与建议

限定检索结果

文献类型

  • 73 篇 会议
  • 14 篇 期刊文献
  • 1 册 图书

馆藏范围

  • 88 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 71 篇 工学
    • 63 篇 计算机科学与技术...
    • 50 篇 软件工程
    • 29 篇 信息与通信工程
    • 13 篇 控制科学与工程
    • 4 篇 电气工程
    • 3 篇 机械工程
    • 3 篇 动力工程及工程热...
    • 3 篇 环境科学与工程(可...
    • 2 篇 力学(可授工学、理...
    • 2 篇 建筑学
    • 2 篇 生物工程
    • 2 篇 网络空间安全
    • 1 篇 土木工程
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 生物医学工程(可授...
  • 30 篇 理学
    • 26 篇 数学
    • 6 篇 统计学(可授理学、...
    • 2 篇 生物学
    • 1 篇 物理学
    • 1 篇 地理学
    • 1 篇 大气科学
    • 1 篇 地球物理学
    • 1 篇 系统科学
  • 23 篇 管理学
    • 15 篇 图书情报与档案管...
    • 10 篇 管理科学与工程(可...
    • 6 篇 工商管理
  • 4 篇 法学
    • 4 篇 社会学
  • 1 篇 经济学
    • 1 篇 应用经济学
  • 1 篇 艺术学
    • 1 篇 设计学(可授艺术学...

主题

  • 12 篇 calculus
  • 10 篇 wireless sensor ...
  • 7 篇 delays
  • 6 篇 distributed comp...
  • 5 篇 servers
  • 4 篇 quality of servi...
  • 4 篇 queueing analysi...
  • 4 篇 delay
  • 4 篇 stochastic proce...
  • 4 篇 ontology
  • 3 篇 aggregates
  • 3 篇 wireless communi...
  • 3 篇 topology
  • 3 篇 uncertainty
  • 3 篇 mathematical mod...
  • 3 篇 sensors
  • 2 篇 sensor nodes
  • 2 篇 routing
  • 2 篇 communication sy...
  • 2 篇 multiplexing

机构

  • 6 篇 distributed comp...
  • 4 篇 disco distribute...
  • 3 篇 lab. of computer...
  • 2 篇 distributed comp...
  • 2 篇 parallel and dis...
  • 2 篇 large scale dist...
  • 2 篇 distributed comp...
  • 2 篇 computer network...
  • 2 篇 ieee
  • 2 篇 distributed comp...
  • 2 篇 acm
  • 2 篇 school of comput...
  • 2 篇 distributed know...
  • 2 篇 school of commun...
  • 2 篇 school of comput...
  • 2 篇 artificial intel...
  • 2 篇 disco distribute...
  • 2 篇 disco / distribu...
  • 2 篇 parallel and dis...
  • 1 篇 computer network...

作者

  • 16 篇 schmitt jens b.
  • 8 篇 jens b. schmitt
  • 5 篇 martinovic ivan
  • 5 篇 steffen bondorf
  • 5 篇 zdarsky frank a.
  • 5 篇 garg vijay k.
  • 4 篇 ivan martinovic
  • 4 篇 janakiram d.
  • 3 篇 paul nikolaus
  • 3 篇 jens schmitt
  • 3 篇 poe wint yi
  • 3 篇 nagar atulya
  • 2 篇 nicos gollan
  • 2 篇 peng bo
  • 2 篇 dai yafei
  • 2 篇 honke benjamin
  • 2 篇 reddy m. venkate...
  • 2 篇 kwon oh-young
  • 2 篇 bauer bernhard
  • 2 篇 tawfik hissam

语言

  • 86 篇 英文
  • 2 篇 其他
  • 1 篇 中文
检索条件"机构=Disco Distributed Computer Systems Lab."
88 条 记 录,以下是31-40 订阅
排序:
SUDOKU: Secure and usable deployment of keys on wireless sensors
SUDOKU: Secure and usable deployment of keys on wireless sen...
收藏 引用
2010 6th IEEE Workshop on Secure Network Protocols, NPSec 2010
作者: Wilhelm, Matthias Martinovic, Ivan Uzun, Ersin Schmitt, Jens B. Disco / Distributed Computer Systems Lab. TU Kaiserslautern Germany Computer Science Department University of California Irvine CA United States
Initial deployment of secrets plays a crucial role in any security design, but especially in hardware constrained wireless sensor networks. Many key management schemes assume either manually pre-installed shared secre... 详细信息
来源: 评论
Improving range query performance on historic web page data
Improving range query performance on historic web page data
收藏 引用
5th Annual ChinaGrid Conference, ChinaGrid 2010
作者: Li, Geng Peng, Bo Lab. of Computer Networks and Distributed Systems Peking University Beijing China
This paper is about the performance of range queries on historic web page data set, i.e. requests into a data set of web pages that keeps record of historic versions of HTML data of URLs on the web for a subset of dat... 详细信息
来源: 评论
A bandwidth reservation strategy for multiprocessor real-time scheduling
A bandwidth reservation strategy for multiprocessor real-tim...
收藏 引用
16th IEEE Real-Time and Embedded Technology and Applications Symposium, RTAS 2010
作者: Massa, Ernesto Lima, George Department of Computer Science Distributed Systems Lab. UFBA - Federal University of Bahia Salvador Brazil
The problem of scheduling a set of tasks on a multiprocessor architecture is addressed. Tasks are assumed to be sporadic with arbitrary deadlines and may migrate between processors. The execution of migrating tasks is... 详细信息
来源: 评论
Statistical response time bounds in randomly deployed wireless sensor networks
Statistical response time bounds in randomly deployed wirele...
收藏 引用
Conference on Local computer Networks (LCN)
作者: Steffen Bondorf B. Schmitt Jens disco | Distributed Computer Systems Lab University of Kaiserslautern Germany Distributed Computer Systems Lab University of Kaiserslautern Germany
Response time bounds are important for many application scenarios of wireless sensor networks (WSN). Often, during the planning phase of a WSN its topology is not known. It rather results from a deployment process. Th... 详细信息
来源: 评论
SUDOKU: Secure and usable deployment of keys on wireless sensors
SUDOKU: Secure and usable deployment of keys on wireless sen...
收藏 引用
IEEE Workshop on Secure Network Protocols (NPSec)
作者: Matthias Wilhelm Ivan Martinovic Ersin Uzun Jens B. Schmitt Disco / Distributed Computer Systems Lab TU Kaiserslautern Germany Computer Science Department University of California Irvine USA
Initial deployment of secrets plays a crucial role in any security design, but especially in hardware constrained wireless sensor networks. Many key management schemes assume either manually pre-installed shared secre... 详细信息
来源: 评论
Situational method engineering applied for the enactment of development processes - An agent based approach
Situational method engineering applied for the enactment of ...
收藏 引用
作者: Seemueller, Holger Voos, Holger Honke, Benjamin Bauer, Bernhard Mobile Robotics and Mechatronics Lab. University of Applied Sciences Ravensburg-Weingarten D-88241 Weingarten Germany Programming Distributed Systems Lab. Institute of Computer Science University of Augsburg D-86135 Augsburg Germany
Interdisciplinary product development is faced with the collab.ration of diverse roles and a multitude of interrelated artifacts. Traditional and sequential process models cannot deal with the long-lasting and dynamic... 详细信息
来源: 评论
+Spaces: Intelligent virtual spaces for eGovernment
+Spaces: Intelligent virtual spaces for eGovernment
收藏 引用
International Conference on Intelligent Environments
作者: Tserpes, Konstantinos Jacovi, Michal Gardner, Michael Triantafillou, Anna Cohen, Benjamin Distributed Knowledge and Media Systems Lab. National Technical University of Athens Athens Greece IBM Research Lab. - Haifa Haifa Israel School of Computer Science and Electronic Engineering University of Essex Colchester United Kingdom Athens Technology Center Athens Greece
Intelligent Environments most commonly take a physical form such as homes, offices, hotels, restaurants, shops, that are equipped with advanced networked computer based systems, which enable better or new lifestyles f... 详细信息
来源: 评论
Node deployment in large wireless sensor networks: Coverage, energy consumption, and worst-case delay  09
Node deployment in large wireless sensor networks: Coverage,...
收藏 引用
Asian Internet Engineeering Conference, AINTEC 2009
作者: Poe, Wint Yi Schmitt, Jens B. Disco / Distributed Computer Systems Lab. University of Kaiserslautern Germany
Node deployment is a fundamental issue to be solved in Wireless Sensor Networks (WSNs). A proper node deployment scheme can reduce the complexity of problems in WSNs as, for example, routing, data fusion, communicatio... 详细信息
来源: 评论
Sink placement without location information in large-scale wireless sensor networks  09
Sink placement without location information in large-scale w...
收藏 引用
Asian Internet Engineeering Conference, AINTEC 2009
作者: Poe, Wint Yi Schmitt, Jens B. Disco / Distributed Computer Systems Lab. University of Kaiserslautern Germany
Wireless Sensor Networks (WSN) comprise a large number of sensor nodes that possess scarce energy supplies. To minimize energy consumption and to consequently extend the lifetime of WSNs, we propose a local search tec... 详细信息
来源: 评论
Security by wireless: Why play fairer than the attacker  09
Security by wireless: Why play fairer than the attacker
收藏 引用
Asian Internet Engineeering Conference, AINTEC 2009
作者: Martinovic, Ivan Disco / Distributed Computer Systems Lab. Computer Science Department University of Kaiserslautern 67653 Kaiserslautern Germany
Security in wireless networks is a notorious problem, suffering from the following dilemma: On the one hand, wireless medium access puts the attacker into a much better position, on the other hand wireless devices mos... 详细信息
来源: 评论